Windows 10 Shortcuts – 2018 Update

Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. We use the following keyboard shortcuts every day: Base Key + Combination Result +... Read more

General Computer MCQ with Answers – 45 Questions

1. What is the size of a sector on a hard disk? A. 512K B. 1K C. 512 bytes D. 4K 2. How many devices can exist in an IDE chain? A. 1 B. 2 C. 3 D. 4 3.... Read more

History of IIoT Cyber Attacks 2007 – 2016

The Industrial Internet of Things (IIoT), aka the Industrial Internet, is the integration of complex machinery with networked sensors and software. The machines are connected and talking to each other, and communicating back to centralized control systems e.g. Manufacturing factories,... Read more

Bruteforce Password Cracking with Medusa – Kali Linux

In Greek mythology, Medusa was a monster, a Gorgon, generally described as a winged human female with living venomous snakes in place of hair. Medusa is a speedy, parallel, and modular, login brute-forcer. The goal is to support as many... Read more

Top 20 Basic Kali Linux Commands

Kali Linux is an open source operating system developed by Offensive Security . It contains a bunch of security tools divided by categories for Penetration Testing or Ethical Hacking in a practical environment to test the reliability and security of... Read more

21 Must Have Firefox Plugins for Hackers – 2018 Update

As you know, Firefox is one of the most popular browser not by ranking but it also supports add-on/plugins to enhance the functionality. Mozilla has a website where you can find various plugins placed in different categories. So we’re explaining... Read more

How to encode Base64 in most popular programming languages

Base64 is a group of similar binary-to-text encoding schemes that represents binary data in an ASCII string format by translating it into radix-64 representation. The example below uses ASCII text for simplicity, but this is not a typical use case,... Read more

CMS & Exploit Kit Detection with WhatCMS

In Internet, more than 70% websites are using ready-made open source CMS like WordPress/Joomla/Drupal etc because a CMS always makes your website easier to use, less expensive to maintain. As we all knows, CMS is a software that stores your... Read more

Crimemail CTF Writeup – Solution

This Crimemail CTF is brought you by InSecurity, a student society from INSA Lyon (France). The Flag format should be look like INSA{…} Collins Hackle is a notorious bad guy who is behind in this CTF. Challenge – Your challenge... Read more

[Solution] Disable the requests in Burp Suite

Approx a year back, Mozilla added a new feature “Captive Portal” support to Firefox browser in an attempt to enhance usability when connecting to free Wi-Fi portals. Captive Portal feature covers the detection and implementation of handles for captive portals... Read more

CTF – Kioptrix Level 4 – Walkthrough step by step

Welcome back to Kioptrix CTF Series! Previously we’ve covered up to 3 Levels of Kioptrix series CTF which you can find by this link. Alright lets start the 4th level of Kioptrix series. Download Link – (Level 1.3) Size –... Read more

General Computer MCQ – With Answers

1. Which type of memory cannot be upgraded without replacing a CPU? A. RAM B. L1 cache C. L2 cache D. None of the above 2. Which type of the system BIOS can be upgraded? A. Flashable B. Non-flashable C.... Read more